Feistel structures for MPC, and more
Efficient PRP/PRFs are instrumental to the design of cryptographic protocols. We investigate
the design of dedicated PRP/PRFs for three application areas-secure multiparty computation …
the design of dedicated PRP/PRFs for three application areas-secure multiparty computation …
[PDF][PDF] Status report on the second round of the NIST lightweight cryptography standardization process
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more Authenticated Encryption with Associated …
standardization process to select one or more Authenticated Encryption with Associated …
An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums
Since it was proposed in 2015 as a generalization of integral properties, the division
property has evolved into a powerful tool for probing the structures of Boolean functions …
property has evolved into a powerful tool for probing the structures of Boolean functions …
Improved division property based cube attacks exploiting algebraic properties of superpoly
At CRYPTO 2017 and IEEE Transactions on Computers in 2018, Todo et al. proposed the
division property based cube attack method making it possible to launch cube attacks with …
division property based cube attack method making it possible to launch cube attacks with …
An algebraic attack on ciphers with low-degree round functions: application to full MiMC
M Eichlseder, L Grassi, R Lüftenegger… - Advances in Cryptology …, 2020 - Springer
Algebraically simple PRFs, ciphers, or cryptographic hash functions are becoming
increasingly popular, for example due to their attractive properties for MPC and new proof …
increasingly popular, for example due to their attractive properties for MPC and new proof …
Exploring differential-based distinguishers and forgeries for ASCON
Automated methods have become crucial components when searching for distinguishers
against symmetric-key cryptographic primitives. While MILP and SAT solvers are among the …
against symmetric-key cryptographic primitives. While MILP and SAT solvers are among the …
Revisiting higher-order differential-linear attacks from an algebraic perspective
Abstract The Higher-order Differential-Linear (HDL) attack was introduced by Biham et al. at
FSE 2005, where a linear approximation was appended to a Higher-order Differential (HD) …
FSE 2005, where a linear approximation was appended to a Higher-order Differential (HD) …
[图书][B] Status report on the final round of the NIST lightweight cryptography standardization process
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more schemes that provide Authenticated …
standardization process to select one or more schemes that provide Authenticated …
Automatic search for a variant of division property using three subsets
The division property proposed at Eurocrypt'15 is a novel technique to find integral
distinguishers, which has been applied to most kinds of symmetric ciphers such as block …
distinguishers, which has been applied to most kinds of symmetric ciphers such as block …
Massive Superpoly Recovery with a Meet-in-the-Middle Framework: Improved Cube Attacks on Trivium and Kreyvium
The cube attack extracts the information of secret key bits by recovering the coefficient called
superpoly in the output bit with respect to a subset of plaintexts/IV, which is called a cube …
superpoly in the output bit with respect to a subset of plaintexts/IV, which is called a cube …